• Like
  • Save
Adaptive Access Contextual Security for Application Delivery Networks
Upcoming SlideShare
Loading in...5
×
 

Adaptive Access Contextual Security for Application Delivery Networks

on

  • 1,125 views

The missing pieces of contextual security for application delivery networks include insufficient identity management; security implementations are unaware of applications/OS/device/access methods; ...

The missing pieces of contextual security for application delivery networks include insufficient identity management; security implementations are unaware of applications/OS/device/access methods; security implementations aren�t integrated; SOA, gadgets and widgets; consolidation/virtualization (dynamic); NAC, NAP and trusted computing; and security is seen as a hindrance, not an enabler. Strengthen your security with behavioral based contextual security.

Statistics

Views

Total Views
1,125
Views on SlideShare
1,124
Embed Views
1

Actions

Likes
1
Downloads
7
Comments
0

1 Embed 1

http://devel2.informationweek.com:9013 1

Accessibility

Categories

Upload Details

Uploaded via as Adobe PDF

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    Adaptive Access Contextual Security for Application Delivery Networks Adaptive Access Contextual Security for Application Delivery Networks Presentation Transcript

    • Adaptive Access p Contextual Security for Application Delivery Networks Peter Silva, Technical Marketing Manager - F5 Networks Bill P db Podborney, Di of I f Dir f Information S ti Security – Alli t Credit U i it Alliant C dit Union
    • Adaptive Access p Behavioral Based Contextual Security for Application Delivery Networks
    • Defense in Depth: A Heretic Speaks • Problems with DiD – “Slow Down” means Latency – Increased Complexity – Inefficient use of Resources – Improperly Deployed • Real World Impact – Slows New Technology Adoption – Not Easily Extensible – No Mandate for Integration